Communications of the ACM
Linguistic Extension for Secret Sharing (m, n)-Threshold Schemes
SECTECH '08 Proceedings of the 2008 International Conference on Security Technology
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners
Secret Sharing System and Secret Sharing Matrix
CIS '09 Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 02
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
Computers & Mathematics with Applications
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications
Grammar encoding in DNA-like secret sharing infrastructure
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Secure Information Management Protocol Based on Linguistic Sharing Techniques
IMIS '11 Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Cognitive systems and bio-inspired computing in homeland security
Journal of Network and Computer Applications
Hi-index | 0.09 |
One issue which is essential for the security of calculations and communication as well as the ability to guarantee data confidentiality is intelligent threshold division of strategic information that may later be passed on to a group of authorized users for reconstruction and shared use. Enabling such division of information acquires particular significance with regard to the management of important and confidential data by various national institutions, corporations or strategic (military) units. It seems that these techniques will become increasingly more important along with the growing number of their applications. The division of confidential information is inevitably related to the cryptographic algorithms of the division of secrets. Relying on these techniques, this paper will focus on two issues. The first is the expansion of the traditional techniques for the division of secrets and the development of the so-called linguistic threshold schemes, a new concept based on the traditional algorithms of the division of information which additionally introduces the stage of linguistic conversion of shared data using specially defined formal grammar. The other is the demonstration of how linguistic threshold schemes thus developed may be used to manage secret data in a variety of selected organizational structures.